Skip to content

Commit adc3f26

Browse files
author
Michał Gryczka
committed
1.6 release blog post fixed and optimized for SEO
1 parent ad7016f commit adc3f26

File tree

2 files changed

+57
-34
lines changed

2 files changed

+57
-34
lines changed

public/images/blog/defguard-1.6-release-notes/always-on vpn.jpg renamed to public/images/blog/defguard-1.6-release-notes/always-on_vpn.jpg

File renamed without changes.

src/content/blog/defguard-1.6-release-notes.mdx

Lines changed: 57 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,88 +1,97 @@
11
---
22
title: "Defguard 1.6 brings Zero-touch Enrollment at Enterprise Scale for WireGuard"
3-
description: "Zero-touch user enrollment, Pre-logon & Always On VPN locations, Clients in AppStore, AD/Entra ID based Provisioning"
3+
description: "Zero-touch WireGuard VPN enrollment, Pre-logon VPN for Active Directory, Always-On VPN, native macOS/Windows clients, and enterprise-scale device provisioning. The most complete open-source WireGuard VPN solution."
44
publishDate: 2025-12-19
55
author: "Michał Gryczka"
66
image: "/images/blog/defguard-1.6-release-notes/Release-1.6.png"
7-
tags: ["release", "wireguard enterprise", "enterprise vpn", "vpn", "security", "active directory"]
7+
tags: ["release", "wireguard enterprise", "enterprise vpn", "vpn", "security", "active directory", "zero-touch enrollment", "macos vpn", "windows vpn", "msi installer", "pre-logon vpn", "always-on vpn", "entra id", "device provisioning"]
88
draft: false
99
---
1010

11-
![Defguard 1.6 Release](/images/blog/defguard-1.6-release-notes/Release-1.6.png)
11+
![Defguard 1.6 Release Banner - Enterprise WireGuard VPN with Zero-touch Enrollment](/images/blog/defguard-1.6-release-notes/Release-1.6.png)
1212

13-
Our mission at Defguard is to deliver a complete Enterprise VPN management solution for Wireguard VPN protocol, that is fully private and guarantees total control and infrastructure ownership.
13+
Our mission at Defguard is to deliver a complete self-hosted WireGuard Enterprise VPN management solution that is fully private and guarantees total control and infrastructure ownership.
1414

15-
Release 1.6 marks an important step in that journey by introducing features requested by many medium and large enterprises, making large scale deployments faster, client management easier and solving a particular blocker for Microsoft Active Directory and EntraID based organisations to deploy WireGuard on scale.
15+
Release 1.6 marks an important step in that journey by introducing features requested by many medium and large enterprises—features that make Defguard a compelling alternative to solutions like Fortinet, Tailscale, and traditional OpenVPN setups, making large-scale deployments faster and client management easier.
16+
> **TL;DR - Key Highlights:**
17+
> - 🔐 **Pre-logon VPN** - Connect to AD before Windows login
18+
> -**Zero-touch Enrollment** - Automate user provisioning at scale
19+
> - 🍎 **macOS App Store** - Native Swift VPN with system integration
20+
> - 🪟 **Windows MSI** - Enterprise deployment via Intune/GPO
21+
> - 📏 **MTU Settings** - Fix connectivity on restrictive networks
1622
17-
## What's new?
23+
You can support us by leaving a <a href="https://github.com/defguard/defguard/" target="_blank">star on GitHub</a> 🙏
1824

19-
### Unlocking Active Directory remote authentication with VPN pre-logon
25+
26+
## What's new? 🚀
27+
28+
### 🔐 Unlocking Active Directory remote authentication with WireGuard VPN pre-logon
2029

2130
Organisations that use Active Directory (AD) to authenticate users on Windows machines face a significant remote access problem: AD should never be exposed to the public internet, since it was designed exclusively for intranet use. Thus, users working remotely—outside of the organisation's perimeter—cannot securely log in without risking exposure of the AD infrastructure to external threats.
2231

2332
The secure solution of that remote access problem is to put Active Directory behind VPN. It works only with VPNs that support establishing connection before the user logs in.
2433

2534
Defguard 1.6 is the first—and currently the only—on-premises enterprise VPN solution that establishes WireGuard connections before user login.
2635

27-
We introduced Service Locations - a special kind of locations that allow establishing automatic VPN connections on system boot and are not visible to the end user.
36+
We introduced Service Locations - a special kind of locations that allow establishing automatic WireGuard VPN connections on system boot and are not visible to the end user.
2837

29-
![Service Location configuration](/images/blog/defguard-1.6-release-notes/always-on vpn.jpg)
38+
![Service Location configuration panel showing Pre-logon and Always-on VPN modes](/images/blog/defguard-1.6-release-notes/always-on_vpn.jpg)
3039

3140
As shown on a location configuration screenshot above, Service Location can run in two modes: "Pre-logon" and "Always-on".
3241

3342
In Pre-logon mode the connection is terminated when the user completes login to their system account. This way devices can securely connect to the domain and authenticate the user without the need to expose Active Directory and keep the connection time limited only to necessary minimum - authentication.
3443

3544
If the lack of pre-logon option for WireGuard was a blocker for your deployment, now you can give it a try with Defguard.
3645

37-
### Enforcing strict security with Client Traffic Policy and Always-on VPN
46+
### 🛡️ Enforcing strict security with Client Traffic Policy and Always-on VPN
3847

3948
Service locations can be also configured to stay active after the user logs in by selecting "Always-on" mode. The connection won't be terminated or restarted unless the Desktop Client receives a network update or is uninstalled.
4049

4150
Always-on mode paired with the option to force the clients to route all traffic through the VPN allows the admin to enforce strict security policy and guarantee access to on-prem resources, preventing data leaks on untrusted networks.
4251

43-
![Client Traffic Policy and Always-on VPN](/images/blog/defguard-1.6-release-notes/traffic-routing.jpg)
52+
![Client Traffic Policy settings for routing all traffic through VPN](/images/blog/defguard-1.6-release-notes/traffic-routing.jpg)
4453

4554
> **Dive deeper with Service Locations documentation:** [https://docs.defguard.net/1.6/features/service-locations](https://docs.defguard.net/1.6/features/service-locations)
4655
4756
---
4857

49-
## Enabling Zero-touch enrollment and device provisioning
58+
## Zero-touch Enrollment for WireGuard Enterprise Deployments
5059

5160
From the outset, Defguard focused on simplicity and security of user enrollment by offering a secure enrollment portal. While convenient for smaller organisations, this approach has limitations when enrolling hundreds or thousands of users.
5261

5362
With the Defguard 1.6 release, we deliver the core elements necessary for automation of Desktop Client Provisioning on all platforms (Windows, Mac and Linux). On a high level:
5463

55-
* **Windows Desktop Client** is now available as an MSI package, enabling admins to distribute the app via tools like Microsoft Intune, Active Directory GPO or other package managers (we are working on publishing to Chocolatey and Scoop).
56-
* **The macOS Client** is now available in the Mac App Store (instead of a standalone PKG installer). This enables automatic updates for users, ensures the application is reviewed and approved by Apple and enables app distribution to managed machines with MDM/UEM tools.
57-
* **All clients** now support file based enrollment configuration (the enrollment token and URL) at first launch as a universal mechanism allowing administrators to preconfigure endpoints for users with any type of provisioning or distribution tool they prefer.
58-
* Also, we've introduced automated enrollment through Active Directory and EntraID in the Windows Client MSI installer
64+
* 🪟 **Windows Desktop Client** is now available as an MSI package, enabling admins to distribute the app via tools like Microsoft Intune, Active Directory GPO or other package managers (we are working on publishing to Chocolatey and Scoop).
65+
* 🍎 **The macOS Client** is now available in the Mac App Store (instead of a standalone PKG installer). This enables automatic updates for users, ensures the application is reviewed and approved by Apple and enables app distribution to managed machines with MDM/UEM tools.
66+
* 📱 **All clients** now support file based enrollment configuration (the enrollment token and URL) at first launch as a universal mechanism allowing administrators to preconfigure endpoints for users with any type of provisioning or distribution tool they prefer.
67+
* 🔗 Also, we've introduced automated enrollment through Active Directory and EntraID in the Windows Client MSI installer
5968

6069
Altogether this release provides all necessary tools for the admins to fully automate user enrollment and device provisioning.
6170

6271
The provisioning process is dependent on your specific environment and tooling but there are some general steps to follow:
6372

64-
1. Generate enrollment tokens for your users. This can be automated by leveraging our REST API.
65-
2. Transfer tokens to end-user machines as a configuration file or in case of Windows connected with AD/EntraID store the tokens in the directory.
66-
3. Install Defguard desktop client on end-user machines.
67-
4. On first startup the user will be redirected to the enrollment flow.
73+
1. 🔑 Generate enrollment tokens for your users. This can be automated by leveraging our REST API.
74+
2. 📤 Transfer tokens to end-user machines as a configuration file or in case of Windows connected with AD/EntraID store the tokens in the directory.
75+
3. 💻 Install Defguard desktop client on end-user machines.
76+
4. 🚀 On first startup the user will be redirected to the enrollment flow.
6877

6978
This way you can achieve Zero-touch user enrollment and scalability of your deployments.
7079

7180
> You can find more details in documentation: [https://docs.defguard.net/1.6/features/desktop-client-auto-provisioning](https://docs.defguard.net/1.6/features/desktop-client-auto-provisioning)
7281
7382
---
7483

75-
## Defguard Desktop for macOS in AppStore with system integrations and native VPN
84+
## 🍎 Defguard Desktop for macOS in AppStore with system integrations and native VPN
7685

7786
The macOS Client now integrates with the macOS system, removing the dependency on external WireGuard binaries and introducing native Swift/macOS VPN implementation.
7887

7988
This allows for an improved macOS usability:
80-
* Maintaining VPN connections while switching from one network to another (e.g. changing WIFI networks).
89+
* Maintaining VPN connections while switching from one network to another (e.g. changing Wi-Fi networks).
8190
* Integration with System Settings and Control Center - Defguard VPN connections are now listed in system settings.
8291

83-
![macOS VPN integration](/images/blog/defguard-1.6-release-notes/vpns.jpg)
92+
![macOS System Settings showing Defguard VPN integration](/images/blog/defguard-1.6-release-notes/vpns.jpg)
8493

85-
Introducing changes make App Store distribution possible and future Defguard client updates seamless.
94+
These changes make App Store distribution possible and future Defguard client updates seamless.
8695

8796
You can download Defguard Desktop client from [AppStore](https://apps.apple.com/pl/app/defguard-desktop-client/id6754601166?mt=12)
8897

@@ -94,23 +103,23 @@ To upgrade to the client, while maintaining the configuration, please follow the
94103

95104
---
96105

97-
## Defguard Windows Client with MSI and native WireGuard networking
106+
## 🪟 Defguard Windows Client with MSI and native WireGuard networking
98107

99-
The Windows Desktop Client now uses a native WireGuard networking implementation based on WireGuardNT, High performance in-kernel WireGuard implementation for Windows ([https://github.com/WireGuard/wireguard-nt](https://github.com/WireGuard/wireguard-nt)). By removing the dependency on the external WireGuard binary, we were able to ship a proper MSI installer, enabling distribution through the Windows Store and standard enterprise deployment channels.
108+
The Windows Desktop Client now uses a native WireGuard networking implementation based on WireGuardNT, a high-performance in-kernel WireGuard implementation for Windows ([https://github.com/WireGuard/wireguard-nt](https://github.com/WireGuard/wireguard-nt)). By removing the dependency on the external WireGuard binary, we were able to ship a proper MSI installer, enabling distribution through the Windows Store and standard enterprise deployment channels.
100109

101110
This change is also foundational for automated provisioning on Windows. All major Windows provisioning and device management solutions rely on MSI-based installers. By moving to MSI, Defguard can integrate with these workflows and execute installer-time scripts.
102111

103112
During installation, helper scripts can connect to Active Directory or Microsoft Entra ID to retrieve enrollment configuration automatically, enabling seamless, hands-off client provisioning in managed environments.
104113

105114
### Important installation and migration considerations
106115

107-
It's important to note that Installing the new 1.6.0 Client from the .msi will leave the previous Client version still installed. This can also cause old VPN connections to still be active until a next system restart is performed.
116+
It's important to note that installing the new 1.6.0 Client from the .msi will leave the previous Client version still installed. This can also cause old VPN connections to still be active until the next system restart is performed.
108117

109118
To resolve this, before upgrading, we recommend first uninstalling the old Client. This will leave your configuration intact and it should carry over to the new Client after its installation, without the need to configure everything again.
110119

111120
---
112121

113-
## MTU settings support in all clients
122+
## 📏 MTU settings support in all clients
114123

115124
On some networks - especially mobile or carrier-grade networks - the MTU (Maximum Transmission Unit) may be lower than usual. When this happens, VPN packets can exceed the network's MTU and get dropped during transmission. This often results in partial connectivity issues or a complete failure to connect to VPN servers.
116125

@@ -120,9 +129,9 @@ As of Defguard Desktop 1.6 (all platforms) you can manually configure the MTU in
120129
121130
---
122131

123-
## How to upgrade to Defguard 1.6?
132+
## 📦 How to upgrade to Defguard 1.6?
124133

125-
This release brings major changes to all components including clients, core and proxy. Upgrading all the components is required for the new feature to work.
134+
This release brings major changes to all components including clients, core and proxy. Upgrading all the components is required for the new features to work.
126135

127136
As usual, we've prepared a migration guide outlining steps you need to take to upgrade your Defguard setup to the latest version.
128137

@@ -132,19 +141,33 @@ Defguard offers Basic Support via email/ticketing system for all Business subscr
132141

133142
If you need additional support, please contact Sales.
134143

144+
135145
---
136146

137-
## What's next - Defguard 2.0!
147+
## 🎯 Ready to Deploy WireGuard at Enterprise Scale?
148+
149+
Whether you're managing 10 or 10,000 devices, Defguard 1.6 gives you the tools for seamless, secure VPN deployment.
150+
151+
- 📥 [**Start with one-line install**](https://docs.defguard.net/getting-started/one-line-install) - Get started in minutes
152+
- 💼 [**View Pricing**](/pricing) - Plans for every organization size
153+
- 📅 [**Book a Demo**](/book-a-demo) - See Defguard in action
154+
- 📖 [**Read the Docs**](https://docs.defguard.net) - Full documentation
155+
156+
------
157+
158+
159+
160+
## 🔮 What's next - Defguard 2.0!
138161

139162
Defguard's future plans are centered on radically simplifying installation and day-one usability, making deployment as frictionless as possible in every scenario we can design for.
140163

141164
We will include a complete UI&UX redesign with streamlined component startup, clearer and more complete documentation, and eventually standardized deployment artifacts such as appliance images. While current implementation constraints limit some of these options today, removing these obstacles is a key priority so administrators can get Defguard running quickly and confidently, without deep specialist knowledge.
142165

143-
### Components Orchestration
166+
### 🎛️ Components Orchestration
144167

145168
At the same time, Defguard aims to evolve into a true enterprise-grade vendor—positioned as a serious alternative to solutions like Fortinet as well as to SaaS offerings. The Defguard Core will become the central orchestrator for the entire platform, coordinating all components from a single control plane but still maintaining strict component isolation. This unified architecture is designed to reduce complexity, minimize configuration errors, and address one of the biggest pain points today.
146169

147-
### UI & UX you deserve
170+
### UI & UX you deserve
148171

149172
UI 2.0 plays a crucial role in this vision by introducing a simpler, more intuitive administrative experience. While many SaaS vendors promise simplicity at the cost of privacy and control, Defguard takes a different approach: delivering even stronger security while keeping ownership fully in the customer's hands. By allowing every component to be self-hosted and controlled, Defguard provides enterprise-level security and autonomy—paired with a consumer-grade user experience that makes setup, management, and scaling straightforward.
150173

@@ -156,7 +179,7 @@ To give you an idea what we're building, we share a preview of Edge Component (e
156179

157180
![Full High Availability](/images/blog/defguard-1.6-release-notes/Step_6_completed.png)
158181

159-
### Full High Availability
182+
### 🔄 Full High Availability
160183

161184
And finally Defguard 2.0 will provide high-availability of all components delivering secure and scalable deployments for any type of organisation.
162185

0 commit comments

Comments
 (0)